期刊文献+

ZUC序列密码算法的选择IV相关性能量分析攻击 被引量:2

Chosen-IV Correlation Power Analysis Attack of ZUC Stream Cipher
下载PDF
导出
摘要 为了分析ZUC序列密码算法在相关性能量分析攻击方面的免疫能力,该文进行了相关研究。为了提高攻击的针对性,该文提出了攻击方案的快速评估方法,并据此给出了ZUC相关性能量分析攻击方案。最后基于ASIC开发环境构建仿真验证平台,对攻击方案进行了验证。实验结果表明该方案可成功恢复48 bit密钥,说明ZUC并不具备相关性能量分析攻击的免疫力,同时也证实了攻击方案快速评估方法的有效性。相比Tang Ming等采用随机初始向量进行差分能量攻击,初始向量样本数达到5000时才能观察到明显的差分功耗尖峰,该文的攻击方案只需256个初始向量,且攻击效果更为显著。 To analyze the immunity of ZUC stream cipher in aspect of correlation power analysis attack, some relevant researches are conducted. In order to improve the pertinence of attack, a rapid assessment method of the attack scheme is presented, and accordingly a correlation power analysis scheme of ZUC is proposed. Finally, based on the simulation platform raised by ASIC development environment, the attack scheme is validated. Experiment results turn out that the scheme can successfully attack 48-bit key, confirming that ZUC is unable to resist the correlation power analysis attack, and the proposed assessment method of attack scheme takes effect. Compared with Tang Ming's experimental, which conducted differential power analysis of ZUC with random initial vectors and observing distinct differential power peak with 5000 initial vectors, the proposed attack scheme only uses 256 initial vectors, and gets better results.
出处 《电子与信息学报》 EI CSCD 北大核心 2015年第8期1971-1977,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61404175 61302107)资助课题
关键词 密码学 序列密码 ZUC 能量分析攻击 评估 Cryptography Stream cipher ZUC Power analysis attack Assessment
  • 相关文献

参考文献18

  • 1Wu H J, Huang T, Phuong H N, et al.. Differential attacks against stream cipher ZUC[C]. Proceedings of the 18th International Conference on the Theory and Application ofCryptology and Information Security, Beijing, China, 2012: 262-277.
  • 2Zhou C F, Feng X T, and Lin D D. The initialization stage analysis of ZUC vl.5[C]. Proceedings of the 10th International Conference, Sanya, China, 2011: 40-53.
  • 3Gautham S. The stream cipher core of the 3GPP encryption standard 128-EEA3: timing attacks and countermeasures[C]. Proceedings of the 7th International Conference, Beijing, China, 2011: 269-288.
  • 4L afitte F, M arkowitch O, and Vav Heule D. SAT based analysis of LTE stream cipher ZUC[C]. Proceedings of the 6th International Conference on Security of Information and Networks, Aksavay, Turkey, 2013: 110-116.
  • 5关杰,丁林,刘树凯.SNOW3G与ZUC流密码的猜测决定攻击[J].软件学报,2013,24(6):1324-1333. 被引量:16
  • 6Tang M, Cheng P P, and Qiu Z L. Differential power analysis on ZUC algorithm lOLl. IACR ePrint, http://eprint.iacr.org/ 2012/299.pdf. 2013-12-01.
  • 7唐明,高剑,孙乐昊,邱镇龙.嵌入式平台下ZUC算法的侧信道频域攻击[J].山东大学学报(理学版),2014,49(9):29-34. 被引量:3
  • 8Reddy E K. Overview of the side channel attacks[J]. Advanced Networking and Applications, 2013, 4(6): 1799-1808.
  • 9Paul K, Joshua J, Benjamin J, et al.. Introduction to differential power analysis[J]. Journal of Cryptography Engineering, 2011, 1(1): 5-27.
  • 10汪鹏君,张跃军,张学龙.防御差分功耗分析攻击技术研究[J].电子与信息学报,2012,34(11):2774-2784. 被引量:10

二级参考文献154

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2赵佳,曾晓洋,韩军,王晶,陈俊.抗差分功耗分析攻击的AES算法的VLSI实现[J].计算机研究与发展,2007,44(3):378-383. 被引量:7
  • 3国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 4MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 5Mangard S, Oswald E, and Popp T. Power Analysis Attacks: Revealing the Secrets of Smart Cards[M]. Graz University of Technology, Austria, Published by Springer, 2007: 1-306.
  • 6Kocher P C. Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems[C]. Advances in Cryptology(CRYPTO'96), Berlin, Springer, 1996, LNCS 1109: 104-113.
  • 7Kocher P C, Jaffe J, Jun B, et al.. Differential power analysis [C]. CRYPTO'99, Santa Barbara, CA, USA, Lecture Notes in Computer Science, Aug. 15-19, 1999: 388-397.
  • 8Gandolfi K, Mourtel C, and Olivier F. Electromagnetic analysis: concrete results[C]. CHES 2001, 2001, LNCS 2162: 251-261.
  • 9Alioto M, Poli M, and Rocchi S. A general power model of differential power analysis attacks to static logic circuits [J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2010, 18(5): 711-724.
  • 10Wang Peng-jun and Hao Li-peng. A novel differential fault analysis on AES-128[C]. 2011 IEEE 9th International Conference on ASIC (ASICON), Xiamen, China, Oct. 25-28, 2011: 9-12.

共引文献57

同被引文献5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部